Yandex Cloud
Search
Contact UsGet started
  • Blog
  • Pricing
  • Documentation
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • ML & AI
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Customer Stories
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Education and Science
    • Yandex Cloud Partner program
  • Blog
  • Pricing
  • Documentation
© 2025 Direct Cursus Technology L.L.C.
Yandex Managed Service for Kubernetes
  • Comparison with other Yandex Cloud services
  • Getting started
    • All guides
    • Connecting to a node over SSH
    • Connecting to a node via OS Login
    • Updating Kubernetes
    • Configuring autoscaling
      • Getting started with Cloud Marketplace
      • Installing Argo CD
      • Installing Chaos Mesh
      • Installing cert-manager with the Cloud DNS ACME webhook plugin
      • Installing Container Storage Interface for S3
      • Installing Crossplane
      • Installing External Secrets Operator
      • Installing ExternalDNS with a plugin for Cloud DNS
      • Installing Falco
      • Installing Filebeat OSS
      • Installing Fluent Bit
      • Installing Gatekeeper
      • Installing Gateway API
      • Installing the GitLab Agent
      • Installing GitLab Runner
      • Installing HashiCorp Vault
      • Installing Ingress NGINX
      • Installing the Application Load Balancer Ingress controller
      • Upgrading the Application Load Balancer Ingress controller
      • Installing Istio
      • Installing Jaeger
      • Installing Kruise
      • Installing Kyverno & Kyverno Policies
      • Installing Loki
      • Installing Metrics Provider
      • Installing NodeLocal DNS
      • Installing Policy Reporter
      • Installing Prometheus Operator
      • Installing Thumbor
      • Installing Velero
    • Connecting external nodes to the cluster
  • Access management
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • Release notes

In this article:

  • Getting started
  • Installation using Yandex Cloud Marketplace
  • Installation using a Helm chart
  • See also
  1. Step-by-step guides
  2. Installing apps from Cloud Marketplace
  3. Installing Gatekeeper

Installing Gatekeeper

Written by
Yandex Cloud
Improved by
Dmitry A.
Updated at May 5, 2025
  • Getting started
  • Installation using Yandex Cloud Marketplace
  • Installation using a Helm chart
  • See also

Gatekeeper is a customizable policy controller and auditor for Kubernetes. Gatekeeper accepts incoming requests to clusters and validates them in real time to make sure they comply with predefined policies.

Getting startedGetting started

Make sure that the security groups for the Managed Service for Kubernetes cluster and its node groups are configured correctly. If any rule is missing, add it.

Warning

The configuration of security groups determines the performance and availability of the cluster and the services and applications running in it.

Installation using Yandex Cloud MarketplaceInstallation using Yandex Cloud Marketplace

  1. Navigate to the folder dashboard and select Managed Service for Kubernetes.

  2. Click the name of the cluster you need and select the Marketplace tab.

  3. Under Application available for installation, select Gatekeeper and click Go to install.

  4. Configure the application:

    • Namespace: Create a new namespace, e.g., gatekeeper-space. If you leave the default namespace, Gatekeeper may work incorrectly.

    • Application name: Specify the application name.

    • Audit interval: Set the interval between audits in seconds. 0 disables audits.

    • Constraint violations limit: Set the maximum number of violations to be logged for each constraint.

    • Only matching resource types: Select this option if you need to validate only those Kubernetes resource types for each constraint that are explicitly specified in the constraint. If no resource types are specified or the option is disabled, all resources will be validated.

    • Create events at audit: Select this option to create a Kubernetes event for each constraint violation detected during the audit, with detailed information about the violation.

    • Events in affected namespace: Select this option if events with violation details should be created in the namespace in which a constraint violation was logged. Only applies if the Create events at audit option is enabled.

      If the Events in affected namespace option is disabled, events will be created in the namespace in which Gatekeeper is installed.

    • Allow external data: Select this option to enable experimental support of external data sources.

  5. Click Install.

  6. Wait for the application to change its status to Deployed.

Installation using a Helm chartInstallation using a Helm chart

  1. Install kubect and configure it to work with the new cluster.

  2. Install Helm v3.8.0 or higher.

  3. To install a Helm chart with Gatekeeper, run the following command:

    helm pull oci://cr.yandex/yc-marketplace/gatekeeper \
      --version 3.12.0 \
      --untar && \
    helm install \
      --namespace <namespace> \
      --create-namespace \
      gatekeeper ./gatekeeper/
    

If you set namespace to the default namespace, Gatekeeper may work incorrectly. We recommend you to specify a value different from all existing namespaces (e.g., gatekeeper-space).

You can redefine optional parameters in the install command using the following key: --set <parameter_name>=<new_value>.

See the table below for a list of redefinable parameters and their default values:

Parameter name Description Default value
auditInterval Interval between audits in seconds 60
constraintViolationsLimit Maximum number of violations to be logged for each constraint 20
auditMatchKindOnly Only matching resource types false
emitAuditEvents Creating events during audit false
auditEventsInvolvedNamespace Creating events in the affected namespace false
enableExternalData Experimental support of external data sources true

See alsoSee also

  • Gatekeeper documentation

  • Library of Gatekeeper policies

Was the article helpful?

Previous
Installing Fluent Bit
Next
Installing Gateway API
© 2025 Direct Cursus Technology L.L.C.